Inventory Information System Analysis Using Web-Based Waterfall Method

Authors

Keywords:

Information System, Web-Based-System, Waterfall Method, System Testing, Inventory

Abstract

This research aims to develop a web-based inventory information system using the Waterfall method. This system is designed to overcome problems in stock management, such as inaccurate recording, late information, and lack of operational efficiency. The Waterfall method is used because of its systematic and structured development flow, starting from needs analysis to the maintenance stage. This system includes main features such as registration, login, management of goods data, categories, stocks, and creation of printable reports. Testing shows that all features run according to user needs and are free from bugs. With an easy-to-use interface and real-time access capabilities, this system is expected to improve the efficiency and accuracy of inventory management in the organization.

References

Andress, J. (2021). Cybersecurity: The beginner’s guide. Packt Publishing.

Anwar, C. (2022). Application of Academic Information System With Extreme Programming Method (Case Study: Jakarta International Polytechnic).

Anwar, C. (2024). Rekomendasi Teknis Untuk Pengolahan Data Berbasis Web. Jurnal Informatika Utama, 2(1), 50-54.

Anwar, C., & Riyanto, J. (2019). Perancangan Sistem Informasi Human Resources Development Pada PT. Semacom Integrated. International Journal of Education, Science, Technology, and Engineering (IJESTE), 2(1), 19-38.

Anwar, C., Jagat, L. S., Yanti, I., Anjarsari, E., & Sholihah, N. A. (2023). Pengembangan Media Pembelajaran Berbasis Teknologi Untuk Meningkatkan Kemampuan Anak. Caruban: Jurnal Ilmiah Ilmu Pendidikan Dasar, 6(2), 154-163.

Anwar, C., Kom, S., Kom, M., Santiari, C. N. P. L., & Sitorus, Z. (2023). Buku Referensi Sistem Informasi Berbasis Kearifan Lokal.

Anwar, C., Nurhasanah, M., Aflaha, D. S. I., & Handayani, S. (2023). DEVELOPMENT OF INFORMATION TECHNOLOGY-BASED LEARNING MEDIA FOR EDUCATORS IN ELEMENTARY SCHOOLS. Jurnal Konseling Pendidikan Islam, 4(2), 345-353.

Anwar, Chairul, et al. "The Application of Mobile Security Framework (MOBSF) and Mobile Application Security Testing Guide to Ensure the Security in Mobile Commerce Applications." Jurnal Sistim Informasi dan Teknologi (2023): 97-102.

Casey, E. (2019). Digital evidence and computer crime: Forensic science, computers and the Internet (3rd ed.). Academic Press.

Chai, C. A. (2023). Peningkatan kesadaran keamanan digital melalui literasi siber di masyarakat perkotaan. Jurnal Keamanan Informasi dan Teknologi, 9(2), 87–95.

Gasser, U., Maclay, C., & Palfrey, J. (2010). Working towards a deeper understanding of digital safety for children and young people in developing nations. Berkman Center Research Publication.

Hakim, A. R., & Sutrisno, E. (2021). Ancaman malware pada media sosial dan upaya pencegahannya. Jurnal Teknologi Informasi dan Komunikasi, 12(1), 45–53.

Handayani, T., Silalahi, L. M., Nugroho, S. S. P., Anwar, C., Mursyidin, I. H., Sumantri, A., ... & Yulianti, B. (2025). PENGANTAR SISTEM INFORMASI: KONSEP, TEKNOLOGI, DAN IMPLEMENTASI.

Indra, S., Anwar, C., Kom, S., Asparizal, S., Kom, M., Nur, R. A., ... & Hafrida, L. KOMPUTER DAN MASYARAKAT. CV Rey Media Grafika.

Kaspersky. (2023). Malwa (Anwar, 2022)re in image files: How hackers hide viruses in photos. Retrieved from https://www.kaspersky.com

Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley.

McFedries, P. (2022). Protecting your privacy online. Que Publishing.

Oktaviani, T., & Prasetyo, R. (2022). Pentingnya literasi digital dalam menghadapi ancaman siber di era komunikasi digital. Jurnal Komunikasi Digital Indonesia, 4(3), 112–121.

Pavur, J. (2020). Image-based malware attacks on WhatsApp: Mechanisms and mitigations. Proceedings of the International Conference on Cybersecurity and Privacy.

Putri, Y. D., & Nugroho, B. (2020). Perlindungan data pribadi di era digital: Studi kasus WhatsApp. Jurnal Hukum dan Teknologi, 5(2), 73–80.

Quinn, M. J. (2020). Ethics for the information age (8th ed.). Pearson.

Rouse, M. (2022). Image steganography and malware infiltration. SearchSecurity by TechTarget. Retrieved from

Samsumar, L. D., Nasiroh, S., Farizy, S., Anwar, C., Mursyidin, I. H., Rosdiyanto, R., ... & Prastyo, D. (2025). KEAMANAN SISTEM INFORMASI: PERLINDUNGAN DATA DAN PRIVASI DI ERA DIGITAL.

Schneier, B. (2020). Secrets and lies: Digital security in a networked world (2nd ed.). Wiley.

Sharma, A., & Grover, S. (2019). Cyber hygiene awareness and practices among mobile app users. International Journal of Cyber Security and Digital Forensics, 8(1), 34–40.

Sobari, A. (2021). WhatsApp sebagai media komunikasi dan potensi ancaman siber. Jurnal Sistem Informasi, 9(2), 56–65.

Stiawan, D., Idris, M. Y. I., & Abdullah, J. (Eds.). (2018). Recent advances in intrusion detection systems for cybersecurity. Springer.

Syahrir, D., & Fauzi, M. (2022). Strategi pencegahan malware berbasis sosial media di kalangan remaja. Jurnal Ilmu Komputer dan Teknologi Informasi, 15(3), 101–108.

Symantec. (2023). Cyber threat report: Malware trends and defenses. NortonLifeLock.

Widodo, H., & Pramudito, R. (2021). Pengaruh literasi digital terhadap kesadaran keamanan data pribadi. Jurnal Literasi Digital Indonesia, 3(2), 88–97.

Wijayanti, R. R., S ST, M. M. S. I., Anwar, C., Kom, S., Indra, S., Kom, M., ... & Kom, M. (2023). Arsitektur dan Organisasi Komputer. CV Rey Media Grafika.

Published

2025-06-30

How to Cite

Daviqia Fadel, & Deryl Iman Condro Baskoro. (2025). Inventory Information System Analysis Using Web-Based Waterfall Method. Journal of Information Systems and Business Technology, 1(1), 67-75. https://journal.jci.co.id/jisbt/article/view/9